The Community for Technology Leaders
2014 47th Hawaii International Conference on System Sciences (2006)
Kauai, Hawaii
Jan. 4, 2006 to Jan. 7, 2006
ISSN: 1530-1605
ISBN: 0-7695-2507-5

Software technology track (PDF)

Agha Gul , Champaign, IL, USA
pp. 211
Adaptive and Evolvable Software Systems: Techniques, Tools, and Applications

Minitrack Introduction (PDF)

Yvonne Coady , University of Victoria
Raymond Klefstad , University of California at Irvine
Jeff Gray , University of Alabama at Birmingham
pp. 212

Adaptive Self-Configuration Architecture for J2EE-Based Middleware Systems (PDF)

Wei Qu , University of Sydney
Yan Zhang , University of Sydney
Anna Liu , Microsoft Australia
pp. 213a

Evolving System Services to Meet Application Requirements (PDF)

Travis Olds , University of Adelaide
Henry Detmold , University of Adelaide
Katrina Falkner , University of Adelaide
Alicia Zakarevicius , University of Adelaide
David S. Munro , University of Adelaide
pp. 213c

Static and Dynamic Weaving in System Software with AspectC++ (PDF)

Fabian Scheler , Friedrich-Alexander University Erlangen-Nuremberg
Wolfgang Schröder-Preikschat , Friedrich-Alexander University Erlangen-Nuremberg
Daniel Lohmann , Friedrich-Alexander University Erlangen-Nuremberg
Olaf Spinczyk , Friedrich-Alexander University Erlangen-Nuremberg
Wasif Gilani , Friedrich-Alexander University Erlangen-Nuremberg
pp. 214a
Understanding Flexible and Distributed Software Development Processes

Minitrack Introduction (PDF)

Pär J. Ågerfalk , University of Limerick and Örebro University
Brian Fitzgerald , University of Limerick
pp. 215

Controls in Flexible Software Development (PDF)

Rosann W. Collins , University of South Florida
Alan R. Hevner , University of South Florida
Michael Harris , University of South Florida
pp. 216a

Risk Factors in Distributed Projects (PDF)

James M. Erickson , University of Illinois at Chicago
Roberto Evaristo , University of Illinois at Chicago
pp. 216c
Information Security Education and Foundational Research

Minitrack Introduction (PDF)

Melissa Dark , Purdue University
Linda Morales , Texas A&M University-Commerce
pp. 217

A Model for Temporal Interval Authorizations (PDF)

Thuy D. Nguyen , Naval Postgraduate School
Timothy E. Levin , Naval Postgraduate School
Francis B. Afinidad , Naval Postgraduate School
Cynthia E. Irvine , Naval Postgraduate School
pp. 218a

Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast (PDF)

I. H. Sudborough , University of Texas at Dallas
M. H. Heydari , James Madison University
L. Morales , Texas A&M University-Commerce
pp. 218b

Assessment of Enterprise Information Security — The Importance of Information Search Cost (PDF)

Pontus Johnson , Royal Institute of Technology
Erik Johansson , Royal Institute of Technology
Mathias Ekstedt , Royal Institute of Technology
pp. 219a

Programming Education in the Era of the Internet: A Paradigm Shift (PDF)

Jim Alves-Foss , University of Idaho
W. Scott Harrison , University of Idaho
Nadine Hanebutte , University of Idaho
pp. 219b

Foundations for Security Aware Software Development Education (PDF)

Alec Yasinsac , Florida State University
J. Todd McDonald , Florida State University
pp. 219c

Experiences with Honeypot Systems: Development, Deployment, and Analysis (PDF)

Rayford B. Vaughn JR, , Mississippi State University
Robert McGrew , Mississippi State University
pp. 220a

Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab (PDF)

Paul Ortman , University of Idaho
David Manz , University of Idaho
Sean Melton , University of Idaho
Paul Oman , University of Idaho
Sergio Caltagirone , University of Idaho
Kyle King , University of Idaho
pp. 220c
Peer-to-Peer Infrastructures and Applications

Minitrack Introduction (PDF)

Jean-Henry Morin , University of Geneva
Karl Aberer , Swiss Federal Institute of Technology
Aris M. Ouksel , University of Illinois at Chicago
pp. 222

Semantic HyperCup (PDF)

Ali Rahnama , Sharif University of Technology
Jafar Habibi , Sharif University of Technology
Habib Rostami , Sharif University of Technology
pp. 223a

Benefit and Pricing of Spatio-Temporal Information in Mobile Peer-to-Peer Networks (PDF)

Bo Xu , University of Illinois at Chicago
Naphtali Rishe , Florida International University
Ouri Wolfson , University of Illinois at Chicago
pp. 223b

Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks (PDF)

Asad Awan , Purdue University
Ananth Grama , Purdue University
Suresh Jagannathan , Purdue University
Ronaldo A. Ferreira , Purdue University
pp. 223c
Security and Survivability of Unbounded Networked Systems

Minitrack Introduction (PDF)

Paul Oman , University of Idaho
Azad Azadmanesh , University of Nebraska - Omaha
Axel Krings , University of Idaho
pp. 224

A Secure Routing Protocol for Wireless Ad Hoc Networks (PDF)

Mukesh Singhal , University of Kentucky
Huaizhi Li , University of Kentucky
pp. 225a

Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection (PDF)

Karin A. Hummel , University of Vienna
Thomas M. Galla , Dependable Computer Systems GmbH
Burkhard Peer , Dependable Computer Systems GmbH
pp. 225b

Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System (PDF)

Miles A. McQueen , Idaho National Laboratory
Mark A. Flynn , Idaho National Laboratory
George A. Beitel , Idaho National Laboratory
Wayne F. Boyer , Idaho National Laboratory
pp. 226
Software Engineering Decision Support/Strategic Software Engineering

Minitrack Introduction (PDF)

Rick Kazman , University of Hawaii
Dan Port , University of Hawaii
Guenther Ruhe , University of Calgary
pp. 227

Defining Complexity Factors for the Architecture Evaluation Framework (PDF)

Jouni Markkula , University of Jyväskylä
Oleksiy Mazhelis , University of Jyväskylä
Mirja Pulkkinen , University of Jyväskylä
Jari A. Lehto , Nokia Networks
pp. 228b

The Influence of Checklists and Roles on Software Practitioner Risk Perception and Decision-Making (PDF)

Guangzhi Zheng , Georgia State University
Mark Keil , Georgia State University
Lei Li , Georgia State University
Lars Mathiassen , Georgia State University
pp. 229b

Using ABC Model for Software Process Improvement: A Balanced Perspective (PDF)

Chiou-Mei Chen , National Sun Yat-Sen University and Tajen Unversity
Han-Wen Tuan , National Sun Yat-Sen University
Chia-Yi Liu , National Sun Yat-Sen University and Wenzao Ursuline College of Language
pp. 229c

Milestone Markets: Software Cost Estimation through Market Trading (PDF)

Donald J. Berndt , University of South Florida
Joni L. Jones , University of South Florida
Dezon Finch , University of South Florida
pp. 230a

Learning IV&V Strategies (PDF)

Tim Menzies , Portland State University
Marcus S. Fisher , NASA/GSFC/IV&V Facility
pp. 230c
Wireless Personal Area and Ad Hoc Networks

Minitrack Introduction (PDF)

Frank Kargl , University of Ulm
Elaine Lawrence , University of Technology - Sydney
Gergely Záruba , University of Texas at Arlington
pp. 231

Bluetooth Discovery Time with Multiple Inquirers (PDF)

Rusty O. Baldwin , Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Brian S. Peterson , Air Force Institute of Technology
pp. 232a

Fault Tolerance in Bluetooth Scatternet Topologies (PDF)

Leigh E. Hodge , Cardiff University
Roger M. Whitaker , Cardiff University
pp. 232b

Push-to-Talk over Bluetooth (PDF)

Valter Rönnholm , Helsinki University of Technology
pp. 232c

Reliable Broadcast in Wireless Mobile Ad Hoc Networks (PDF)

David Cavin , École Polytechnique Fédérale de Lausanne
Mansoor Mohsin , University of Texas at Dallas
Yoav Sasson , École Polytechnique Fédérale de Lausanne
André Schiper , École Polytechnique Fédérale de Lausanne
Ravi Prakash , University of Texas at Dallas
pp. 233a

Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets (PDF)

Gergely Záruba , University of Texas at Arlington
Jyothsna Kalvala , University of Texas at Arlington
pp. 233b

Identification in Ad Hoc Networks (PDF)

Frank Kargl , Ulm University
Stefan Schlott , Ulm University
Michael Weber , Ulm University
pp. 233c
Wireless Sensor Networks

Minitrack Introduction (PDF)

Giuseppe Anastasi , University of Pisa
Stefan Olariu , Old Dominion University
Edoardo Biagioni , University of Hawaii at Manoa
pp. 234

Robust and Efficient Data Gathering for Wireless Sensor Networks (PDF)

Marco Ortolani , University of Palermo
Giuseppe Lo Re , University of Palermo
Luca Gatani , University of Palermo
pp. 235a

Biology Inspired Approach for Communal Behavior in Sensor Networks (PDF)

K. N. Lodding , NASA Langley Research Center
K. H. Jones , NASA Langley Research Center
L. Wilson , Old Dominion University
C. Xin , Norfolk State University
pp. 235b

On Scaling Distributed Low-Power Wireless Image Sensors (PDF)

Nina M. Berry , Sandia National Laboratories
Teresa H. Ko , Sandia National Laboratories
pp. 235c

Detection Performance and Energy Efficiency of Sequential Detection in a Sensor Network (PDF)

Lige Yu , University of Maryland at College Park
Anthony Ephremides , University of Maryland at College Park
pp. 236a

Energy Conserving Architectures and Algorithms for Wireless Sensor Networks (PDF)

Shyamala C. Sivakumar , Saint Mary?s University
Frank Comeau , Dalhousie University
William J. Phillips , Dalhousie University
William Robertson , Dalhousie University
pp. 236c

Processing of Data Streams with Prediction Functions (PDF)

Arantza Illarramendi , University of the Basque Country
Naphtali Rishe , Florida International University
Eduardo Mena , University of Zaragoza
Ouri Wolfson , University of Illinois at Chicago
Sergio Ilarri , University of Zaragoza
pp. 237a

Construction and Maintenance of a Cluster-Based Architecture for Sensor Networks (PDF)

Wei Chen , Tennessee State University
Koichi Wada , Nagoya Institute of Technology
Jiro Uchida , Nagoya Institute of Technology
Islam A.K.M. Muzahidul , Nagoya Institute of Technology
Yoshiaki Katayama , Nagoya Institute of Technology
pp. 237c
95 ms
(Ver 3.3 (11022016))